Attack

AITX’s RAD Announces ATM Hook & Chain Attack AI Analytic

Retrieved on: 
Thursday, February 15, 2024

Detroit, Michigan, Feb. 15, 2024 (GLOBE NEWSWIRE) -- Robotic Assistance Devices (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc. (the “Company”) (OTCPK:AITX), today announced a significant addition to its suite of AI analytics. This innovation equips RAD's robotic security solutions with the capability to detect the rampant threat of Hook & Chain ATM attacks plaguing the banking industry. A Hook and Chain attack involves attaching one end of a chain or cable to an ATM and using a vehicle to exert force on the machine, usually by pulling the chain with the vehicle, with the objective of forcefully open the ATM's safe doors, allowing thieves to access the cash inside. With this development, RAD continues to lead the charge in providing cutting-edge security solutions tailored to meet the evolving challenges faced by financial institutions and other enterprise clients.

Key Points: 
  • This innovation equips RAD's robotic security solutions with the capability to detect the rampant threat of Hook & Chain ATM attacks plaguing the banking industry.
  • Hook and chain attacks were the leading ATM crime, in which thieves steal the cash from an ATM machine and cause extensive property damage, sometimes with loss and damages approaching $500K per incident.
  • Mark Folmer, CPP, PSP, FSyI, President of RAD, added, “The Hook & Chain analytic was requested during discussions with a leading national bank with over 1000 branches.
  • We currently have highly satisfied banking clients who are eager to implement the ATM attack detection analytic.

Average DDoS Attack Cost Businesses Nearly Half a Million Dollars in 2023, According to New Zayo Data

Retrieved on: 
Thursday, February 15, 2024

According to new Zayo data, the average DDoS attack lasted 68 minutes in 2023.

Key Points: 
  • According to new Zayo data, the average DDoS attack lasted 68 minutes in 2023.
  • With unprotected organizations shelling out an average of $6,000 per minute of each attack, that totals a startling $408,000 average cost to businesses for DDoS attacks.
  • View the full release here: https://www.businesswire.com/news/home/20240215983548/en/
    A key driver to this enormous cost was the steep rise in the duration of DDoS attacks throughout the year.
  • Notably, 72,000 of these attacks occurred in the first half of 2023, and 31,000 occurred in the second half.

New VicOne xNexus Next-Gen VSOC Platform Delivers Contextualized Threat Intelligence for Robust Automotive Defense

Retrieved on: 
Tuesday, February 13, 2024

VicOne, an automotive cybersecurity solutions leader, today announced the xNexus next-generation vehicle security operations center (VSOC) platform.

Key Points: 
  • VicOne, an automotive cybersecurity solutions leader, today announced the xNexus next-generation vehicle security operations center (VSOC) platform.
  • The new solution integrates with VicOne’s in-vehicle VSOC sensor, leveraging a unique Large Language Modeling (LLM) approach to provide customized reporting to support VSOC teams.
  • xNexus can provide product security incident response teams (PSIRTs) or engineering teams with actionable and contextualized attack intelligence based on the needs of different stakeholders.
  • The capabilities delivered by the new VicOne solution accelerate threat investigations, enable confident response to attacks and effectively reduce the burden of chasing inexplicable false alarms.

Surge in "Hunter-killer" Malware Uncovered by Picus Security

Retrieved on: 
Tuesday, February 13, 2024

SAN FRANCISCO, Feb. 13, 2024 /PRNewswire/ -- Picus Security, the Security Validation company, has released the Picus Red Report 2024. This fourth annual report shares learnings from an in-depth analysis of more than 600,000 real-world malware samples and identifies the most common techniques leveraged by attackers. This year, Picus uncovered a surge of "Hunter-killer" malware from the research findings, demonstrating a drastic shift in adversaries' ability to identify and neutralize advanced enterprise defenses such as next-gen firewalls, antivirus, and EDR. According to the report, there was a 333% increase in malware that can actively target defensive systems in an attempt to disable them. 

Key Points: 
  • SAN FRANCISCO, Feb. 13, 2024 /PRNewswire/ -- Picus Security , the Security Validation company, has released the Picus Red Report 2024 .
  • This year, Picus uncovered a surge of "Hunter-killer" malware from the research findings, demonstrating a drastic shift in adversaries' ability to identify and neutralize advanced enterprise defenses such as next-gen firewalls, antivirus, and EDR.
  • "We are witnessing a surge in ultra-evasive, highly aggressive malware which shares the characteristics of hunter-killer submarines," said Dr. Suleyman Ozarslan, Picus Security Co-founder and VP of Picus Labs.
  • Between January 2023 and December 2023, Picus Labs, the research unit of Picus Security, analyzed 667,401 unique files, with 612,080 (92%) categorized as malicious.

Surge in "Hunter-killer" Malware Uncovered by Picus Security

Retrieved on: 
Tuesday, February 13, 2024

SAN FRANCISCO, Feb. 13, 2024 /PRNewswire/ -- Picus Security, the Security Validation company, has released the Picus Red Report 2024. This fourth annual report shares learnings from an in-depth analysis of more than 600,000 real-world malware samples and identifies the most common techniques leveraged by attackers. This year, Picus uncovered a surge of "Hunter-killer" malware from the research findings, demonstrating a drastic shift in adversaries' ability to identify and neutralize advanced enterprise defenses such as next-gen firewalls, antivirus, and EDR. According to the report, there was a 333% increase in malware that can actively target defensive systems in an attempt to disable them. 

Key Points: 
  • SAN FRANCISCO, Feb. 13, 2024 /PRNewswire/ -- Picus Security , the Security Validation company, has released the Picus Red Report 2024 .
  • This year, Picus uncovered a surge of "Hunter-killer" malware from the research findings, demonstrating a drastic shift in adversaries' ability to identify and neutralize advanced enterprise defenses such as next-gen firewalls, antivirus, and EDR.
  • "We are witnessing a surge in ultra-evasive, highly aggressive malware which shares the characteristics of hunter-killer submarines," said Dr. Suleyman Ozarslan, Picus Security Co-founder and VP of Picus Labs.
  • Between January 2023 and December 2023, Picus Labs, the research unit of Picus Security, analyzed 667,401 unique files, with 612,080 (92%) categorized as malicious.

The Top 2024 Cybersecurity Priorities for CISOs and Security Leaders Revealed in New Report by Info-Tech Research Group

Retrieved on: 
Monday, February 12, 2024

Recognizing the urgent need for robust and dynamic security strategies, Info-Tech Research Group has published its Security Priorities 2024 report .

Key Points: 
  • Recognizing the urgent need for robust and dynamic security strategies, Info-Tech Research Group has published its Security Priorities 2024 report .
  • The Security Priorities 2024 report reveals the pressing issues that IT and security leaders must prioritize and advocates for a pivot from traditional, reactive security postures to proactive, predictive security strategies.
  • In the face of ever-evolving cyber threats, the Security Priorities 2024 report provides security leaders with a blueprint for safeguarding their digital environment.
  • For exclusive media commentary from Ahmad Jowhar, a cybersecurity and privacy expert, or to access the complete Security Priorities 2024 report, please contact [email protected] .

Government Sector is Top Targeted Industry for DDoS Attacks in Q4 2023

Retrieved on: 
Thursday, February 8, 2024

DENVER, Feb. 8, 2024 /PRNewswire/ -- The government sector experienced a surge of DDoS attacks in Q4 according to Lumen Technologies (NYSE: LUMN), a global leader in integrated network and cybersecurity solutions. The Lumen Quarterly DDoS & Application Threat Report for Q4 2023 analyzes data from its DDoS mitigation platform and application protection partner, ThreatX, to provide an overview of the DDoS and application-layer attacks that targeted organizations in the last quarter of 2023.

Key Points: 
  • The Lumen Quarterly DDoS & Application Threat Report for Q4 2023 analyzes data from its DDoS mitigation platform and application protection partner, ThreatX, to provide an overview of the DDoS and application-layer attacks that targeted organizations in the last quarter of 2023.
  • According to the report, the government sector was hit hard:
    66% of the 1,000 largest attacks Lumen mitigated were targeting the government.
  • One government customer accounted for 1,759 attacks of the 1,953 government attacks in Q4, showing a persistent and focused campaign by cybercriminals.
  • Lumen's report also reveals that its largest DDoS attack of 2023 happened in Q4, reaching a peak of 903 Gbps.

Pervasive OT & IoT Network Anomalies Raise Red Flags as Threats to Critical Infrastructure Become More Sophisticated

Retrieved on: 
Thursday, February 8, 2024

SAN FRANCISCO, Feb. 8, 2024 /PRNewswire/ -- The latest Nozomi Networks Labs OT & IoT Security Report released today finds that network anomalies and attacks were the most prevalent threat to OT and IoT environments. Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.    

Key Points: 
  • Vulnerabilities within critical manufacturing also surged 230% – a cause for concern as threat actors have far more opportunities to access networks and cause these anomalies.
  • The most concerning of these network anomalies, which can indicate highly sophisticated threat actors being involved, increased 19% over the previous reporting period.
  • According to the findings, malicious IoT botnets remain active this year, and botnets continue to use default credentials in attempts to access IoT devices.
  • Nozomi Networks Labs "OT & IoT Security Report: Assessing the Threat Landscape" provides security professionals with the latest insights needed to re-evaluate risk models and security initiatives, along with actionable recommendations for securing critical infrastructure.

Acronis End-of-Year Cyberthreats Report Uncovers 222% Surge in Email Attacks During 2023

Retrieved on: 
Wednesday, February 7, 2024

Titled “ Acronis Cyberthreats Report, H2 2023: Alarming rise in cyberattacks, SMBs and MSPs in the crosshairs ,” the report provides an in-depth analysis and prescriptive outlook on key security issues and prevalent cyberthreats worldwide.

Key Points: 
  • Titled “ Acronis Cyberthreats Report, H2 2023: Alarming rise in cyberattacks, SMBs and MSPs in the crosshairs ,” the report provides an in-depth analysis and prescriptive outlook on key security issues and prevalent cyberthreats worldwide.
  • "The Acronis Cyberthreats Report H2 2023 highlights the continued threats faced by businesses of all sizes worldwide,” said Michael Suby, Research VP, IDC.
  • Released biannually, the Acronis Cyberthreats Report sets the industry standard by consistently establishing itself as a benchmark for cybersecurity intel.
  • For more information, download a copy of the full Acronis End-of-Year Cyberthreats Report 2023 here: https://go.acronis.com/cyberthreats-2023-h2
    To learn more about the report and its findings, visit the Acronis blog post: https://www.acronis.com/en-us/blog/posts/ransomware-and-software-vulnera...

New Threat Intelligence Report Exposes the Impact of Generative AI on Remote Identity Verification

Retrieved on: 
Wednesday, February 7, 2024

iProov , the leading provider of science-based biometric identity solutions, today launched The iProov Threat Intelligence Report 2024: The Impact of Generative AI on Remote Identity Verification .

Key Points: 
  • iProov , the leading provider of science-based biometric identity solutions, today launched The iProov Threat Intelligence Report 2024: The Impact of Generative AI on Remote Identity Verification .
  • iProov’s report examines the remote identity verification threat landscape, providing first-hand insights into the anatomy of a digital injection attack and exposing bad actor methodologies, threat trends, and impacts.
  • However, this growth's unintended side effect is an ever-expanding attack surface that, coupled with the availability of easily accessible and criminally weaponized generative artificial intelligence (AI) tools, has increased the need for highly secure remote identity verification.
  • The iProov Biometric Threat Intelligence 2023 Report is informed by data from the iProov Security Operations Center (iSOC) and expert analysis.